Date: Thu, 9 Mar 2023 16:35:27 GMT From: Li-Wen Hsu <lwhsu@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: ef50a6277496 - main - security/vuxml: Document Jenkins Security Advisory 2023-03-08 Message-ID: <202303091635.329GZRDI030894@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by lwhsu: URL: https://cgit.FreeBSD.org/ports/commit/?id=ef50a6277496459f96eff8bb96287995511ad5d4 commit ef50a6277496459f96eff8bb96287995511ad5d4 Author: Li-Wen Hsu <lwhsu@FreeBSD.org> AuthorDate: 2023-03-09 16:32:14 +0000 Commit: Li-Wen Hsu <lwhsu@FreeBSD.org> CommitDate: 2023-03-09 16:35:07 +0000 security/vuxml: Document Jenkins Security Advisory 2023-03-08 Sponsored by: The FreeBSD Foundation --- security/vuxml/vuln/2023.xml | 48 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 48 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index d02ae8240a4f..bfbaf05bc2e0 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,51 @@ + <vuln vid="f68bb358-be8e-11ed-9215-00e081b7aa2d"> + <topic>jenkins -- multiple vulnerabilities</topic> + <affects> + <package> + <name>jenkins</name> + <range><lt>2.394</lt></range> + </package> + <package> + <name>jenkins-lts</name> + <range><lt>2.387.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Jenkins Security Advisory:</p> + <blockquote cite="https://www.jenkins.io/security/advisory/2023-03-08/"> + <h1>Description</h1> + <h5>(High) SECURITY-3037 / CVE-2023-27898</h5> + <p>XSS vulnerability in plugin manager</p> + <h5>(Medium) SECURITY-3030 / CVE-2023-24998 (upstream issue), CVE-2023-27900 (MultipartFormDataParser), CVE-2023-27901 (StaplerRequest)</h5> + <p>DoS vulnerability in bundled Apache Commons FileUpload library</p> + <h5></h5> + <h5>(Medium) SECURITY-1807 / CVE-2023-27902</h5> + <p>Workspace temporary directories accessible through directory browser</p> + <h5>(Low) SECURITY-3058 / CVE-2023-27903</h5> + <p>Temporary file parameter created with insecure permissions</p> + <h5>(Low) SECURITY-2120 / CVE-2023-27904</h5> + <p>Information disclosure through error stack traces related to agents</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-27898</cvename> + <cvename>CVE-2023-24998</cvename> + <cvename>CVE-2023-27900</cvename> + <cvename>CVE-2023-27901</cvename> + <cvename>CVE-2023-27902</cvename> + <cvename>CVE-2023-27903</cvename> + <cvename>CVE-2023-27904</cvename> + <cvename></cvename> + <url>https://www.jenkins.io/security/advisory/2023-03-08/</url> + </references> + <dates> + <discovery>2023-03-08</discovery> + <entry>2023-03-09</entry> + </dates> + </vuln> + <vuln vid="742279d6-bdbe-11ed-a179-2b68e9d12706"> <topic>go -- crypto/elliptic: incorrect P-256 ScalarMult and ScalarBaseMult results</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202303091635.329GZRDI030894>